Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ittai Abraham is active.

Publication


Featured researches published by Ittai Abraham.


acm special interest group on data communication | 2016

Virtualized Congestion Control

Bryce Cronkite-Ratcliff; Aran Bergman; Shay Vargaftik; Madhusudhan Ravi; Nick McKeown; Ittai Abraham; Isaac Keslassy

New congestion control algorithms are rapidly improving datacenters by reducing latency, overcoming incast, increasing throughput and improving fairness. Ideally, the operating system in every server and virtual machine is updated to support new congestion control algorithms. However, legacy applications often cannot be upgraded to a new operating system version, which means the advances are off-limits to them. Worse, as we show, legacy applications can be squeezed out, which in the worst case prevents the entire network from adopting new algorithms. Our goal is to make it easy to deploy new and improved congestion control algorithms into multitenant datacenters, without having to worry about TCP-friendliness with non-participating virtual machines. This paper presents a solution we call virtualized congestion control. The datacenter owner may introduce a new congestion control algorithm in the hypervisors. Internally, the hypervisors translate between the new congestion control algorithm and the old legacy congestion control, allowing legacy applications to enjoy the benefits of the new algorithm. We have implemented proof-of-concept systems for virtualized congestion control in the Linux kernel and in VMware’s ESXi hypervisor, achieving improved fairness, performance, and control over guest bandwidth allocations.


public key cryptography | 2017

Asymptotically tight bounds for composing ORAM with PIR

Ittai Abraham; Christopher W. Fletcher; Kartik Nayak; Benny Pinkas; Ling Ren

Oblivious RAM (ORAM) is a cryptographic primitive that allows a trusted client to outsource storage to an untrusted server while hiding the client’s memory access patterns to the server. The last three decades of research on ORAMs have reduced the bandwidth blowup of ORAM schemes from \(O(\sqrt{N})\) to O(1). However, all schemes that achieve a bandwidth blowup smaller than \(O(\log N)\) use expensive computations such as homomorphic encryptions. In this paper, we achieve a sub-logarithmic bandwidth blowup of \(O(\log _{d} N)\) (where d is a free parameter) without using expensive computation. We do so by using a d-ary tree and a two server private information retrieval (PIR) protocol based on inexpensive XOR operations at the servers. We also show a \(\varOmega (\log _{cD} N)\) lower bound on bandwidth blowup in the modified model involving PIR operations. Here, c is the number of blocks stored by the client and D is the number blocks on which PIR operations are performed. Our construction matches this lower bound implying that the lower bound is tight for certain parameter ranges. Finally, we show that C-ORAM (CCS 15) and CHf-ORAM violate the lower bound. Combined with concrete attacks on C-ORAM/CHf-ORAM, we claim that there exist security flaws in these constructions.


symposium on operating systems principles | 2017

PebblesDB: Building Key-Value Stores using Fragmented Log-Structured Merge Trees

Pandian Raju; Rohan Kadekodi; Vijay Chidambaram; Ittai Abraham

Key-value stores such as LevelDB and RocksDB offer excellent write throughput, but suffer high write amplification. The write amplification problem is due to the Log-Structured Merge Trees data structure that underlies these key-value stores. To remedy this problem, this paper presents a novel data structure that is inspired by Skip Lists, termed Fragmented Log-Structured Merge Trees (FLSM). FLSM introduces the notion of guards to organize logs, and avoids rewriting data in the same level. We build PebblesDB, a high-performance key-value store, by modifying HyperLevelDB to use the FLSM data structure. We evaluate PebblesDB using micro-benchmarks and show that for write-intensive workloads, PebblesDB reduces write amplification by 2.4-3x compared to RocksDB, while increasing write throughput by 6.7x. We modify two widely-used NoSQL stores, MongoDB and HyperDex, to use PebblesDB as their underlying storage engine. Evaluating these applications using the YCSB benchmark shows that throughput is increased by 18-105% when using PebblesDB (compared to their default storage engines) while write IO is decreased by 35-55%.


symposium on the theory of computing | 2015

Byzantine Agreement with Optimal Early Stopping, Optimal Resilience and Polynomial Complexity

Ittai Abraham; Danny Dolev

We provide the first protocol that solves Byzantine agreement with optimal early stopping (min{f+2,t+1} rounds) and optimal resilience (n>3t) using polynomial message size and computation. All previous approaches obtained sub-optimal results and used resolve rules that looked only at the immediate children in the EIG (Exponential Information Gathering) tree. At the heart of our solution are new resolve rules that look at multiple layers of the EIG tree.


applied cryptography and network security | 2018

Distributed SSH Key Management with Proactive RSA Threshold Signatures

Yotam Harchol; Ittai Abraham; Benny Pinkas

SSH is a security network protocol that uses public key cryptography for client authentication. SSH connections are designed to be run between a client and a server and therefore in enterprise networks there is no centralized monitoring of all SSH connections. An attractive method for enforcing such centralized control, audit or even revocation is to require all clients to access a centralized service in order to obtain their SSH keys. The benefits of centralized control come with new challenges in security and availability.


symposium on principles of programming languages | 2017

Online detection of effectively callback free objects with applications to smart contracts

Shelly Grossman; Ittai Abraham; Guy Golan-Gueta; Yan Michalevsky; Noam Rinetzky; Mooly Sagiv; Yoni Zohar

Callbacks are essential in many programming environments, but drastically complicate program understanding and reasoning because they allow to mutate objects local states by external objects in unexpected fashions, thus breaking modularity. The famous DAO bug in the cryptocurrency framework Ethereum, employed callbacks to steal


ACM Transactions on Algorithms | 2016

Forbidden-Set Distance Labels for Graphs of Bounded Doubling Dimension

Ittai Abraham; Shiri Chechik; Cyril Gavoille; David Peleg

150M. We define the notion of Effectively Callback Free (ECF) objects in order to allow callbacks without preventing modular reasoning. An object is ECF in a given execution trace if there exists an equivalent execution trace without callbacks to this object. An object is ECF if it is ECF in every possible execution trace. We study the decidability of dynamically checking ECF in a given execution trace and statically checking if an object is ECF. We also show that dynamically checking ECF in Ethereum is feasible and can be done online. By running the history of all execution traces in Ethereum, we were able to verify that virtually all existing contract executions, excluding these of the DAO or of contracts with similar known vulnerabilities, are ECF. Finally, we show that ECF, whether it is verified dynamically or statically, enables modular reasoning about objects with encapsulated state.


symposium on the theory of computing | 2018

Metric embedding via shortest path decompositions

Ittai Abraham; Arnold Filtser; Anupam Gupta; Ofer Neiman

This article proposes a forbidden-set labeling scheme for the family of unweighted graphs with doubling dimension bounded by α. For an n-vertex graph G in this family, and for any desired precision parameter e > 0, the labeling scheme stores an O(1 + e− 1)2αlog 2n-bit label at each vertex. Given the labels of two end-vertices s and t, and the labels of a set F of “forbidden” vertices and/or edges, our scheme can compute, in O(1 + e − 1)2α · vFv2log n time, a 1 + e stretch approximation for the distance between s and t in the graph GsF. The labeling scheme can be extended into a forbidden-set labeled routing scheme with stretch 1 + e for graphs of bounded doubling dimension.


Operating Systems Review | 2017

Consistent Clustered Applications with Corfu

Medhavi Dhawan; Gurprit Johal; Jim Stabile; Vjekoslav Brajkovic; James Chang; Kapil Goyal; Kevin James; Zeeshan Lokhandwala; Anny Martínez Manzanilla; Roger Michoud; Maithem Munshed; Srinivas Neginhal; Konstantin Spirov; Michael Wei; Scott Lystig Fritchie; Christopher J. Rossbach; Ittai Abraham; Dahlia Malkhi

We study the problem of embedding weighted graphs of pathwidth k into ℓp spaces. Our main result is an O(kmin{1p,12})-distortion embedding. For p=1, this is a super-exponential improvement over the best previous bound of Lee and Sidiropoulos. Our distortion bound is asymptotically tight for any fixed p >1. Our result is obtained via a novel embedding technique that is based on low depth decompositions of a graph via shortest paths. The core new idea is that given a geodesic shortest path P, we can probabilistically embed all points into 2 dimensions with respect to P. For p>2 our embedding also implies improved distortion on bounded treewidth graphs (O((klogn)1p)). For asymptotically large p, our results also implies improved distortion on graphs excluding a minor.


Archive | 2016

Solidus: An Incentive-compatible Cryptocurrency Based on Permissionless Byzantine Consensus.

Ittai Abraham; Dahlia Malkhi; Kartik Nayak; Ling Ren; Alexander Spiegelman

The NSX R&D team and VMware Research team are using Corfu to build breakthrough, auto-configurable, auto-managed clustering management tools.

Collaboration


Dive into the Ittai Abraham's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ofer Neiman

Ben-Gurion University of the Negev

View shared research outputs
Top Co-Authors

Avatar

Ling Ren

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Arnold Filtser

Ben-Gurion University of the Negev

View shared research outputs
Top Co-Authors

Avatar

Amy Tai

Princeton University

View shared research outputs
Researchain Logo
Decentralizing Knowledge